C. Hernandez Ganan
Please Note
73 records found
1
WFE-Tab
Overcoming limitations of TabPFN in IIoT-MEC environments with a weighted fusion ensemble-TabPFN model for improved IDS performance
Bits and Pieces
Piecing Together Factors of IoT Vulnerability Exploitation
The machines are watching
Exploring the potential of Large Language Models for detecting Algorithmically Generated Domains
RAMPAGE
A software framework to ensure reproducibility in algorithmically generated domains detection
"All Sorts of Other Reasons to Do It"
Explaining the Persistence of Sub-optimal IoT Security Advice
Peering into the Darkness
The Use of UTRS in Combating DDoS Attacks
Poster
Empirical Analysis of Lifespan Increase of IoT C&C Domains
Alert Alchemy
SOC Workflows and Decisions in the Management of NIDS Rules
Bin there, target that
Analyzing the target selection of IoT vulnerabilities in malware binaries
Back-to-the-Future Whois
An IP Address Attribution Service for Working with Historic Datasets
Intercept and Inject
DNS Response Manipulation in the Wild
Lessons in Prevention and Cure
A User Study of Recovery from Flubot Smartphone Malware
No Spring Chicken
Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
Ruling the Rules
Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection